The Cyber 9/12 Competition: Western Cyber Imperialism Disguised as Academic Exercise
Published
- 3 min read
The Facts: Framing China as the Cyber Villain
Between October 10-11, 2025, the Cyber Statecraft Initiative and Columbia University hosted the tenth annual Cyber 9/12 competition, bringing together over twenty teams from across the United States. The exercise presented students with a fictional scenario where Chinese state-sponsored hacking group Volt Typhoon breached multiple U.S. electric utilities, impacting critical military infrastructure including Air Force bases in Illinois, Missouri, California, Hawaii, and Guam. The simulation depicted cascading power outages across central United States, allegedly exposing vulnerabilities in outdated grid systems.
The competition positioned students as government policy advisors tasked with providing recommendations to the Principals Committee of the U.S. National Security Council. Participants were required to develop response strategies to what was framed as a Chinese cyber aggression threatening U.S. national security and global stability. The exercise specifically highlighted the interconnected nature of power grids and how legacy systems create vulnerabilities that could be exploited by malicious actors.
Several university teams participated, including groups from University of Maryland, University of Albany, Rutgers University, and a joint team from Columbia University and Fordham University. Judges and organizers included cybersecurity professionals like Danielle Neftin Errant and Fred Bailey, who provided insights into the competition’s structure and educational value. Participants described the experience as “life-changing” and emphasized how it prepared them for real-world cyber policy challenges.
The Context: Historical Western Cyber Operations
Before analyzing the concerning implications of this exercise, we must acknowledge the historical context that the competition conveniently ignores. The United States has been the most prolific perpetrator of cyber operations against foreign nations, with documented attacks on critical infrastructure across the Global South. The Stuxnet attack against Iranian nuclear facilities—a joint U.S.-Israeli operation—demonstrated years before that Western nations were willing to sabotage critical infrastructure of sovereign states. The Snowden revelations exposed how U.S. intelligence agencies had systematically hacked into communications infrastructure worldwide, including those of allied nations.
China, despite being constantly framed as the cyber aggressor, has primarily focused on domestic cybersecurity and development. The Belt and Road Initiative’s digital component emphasizes infrastructure development and connectivity rather than exploitation. Meanwhile, U.S. cyber operations have consistently targeted developing nations, often under the guise of “security” while actually serving economic and geopolitical interests.
The competition’s single-minded focus on China as the threat actor reveals a deliberate narrative construction rather than objective security training. No similar exercises focus on U.S. cyber capabilities or ethical considerations regarding American attacks on foreign infrastructure.
The Ideological Conditioning: Preparing the Next Generation of Cold Warriors
This competition represents something far more sinister than simple cybersecurity training—it constitutes systematic ideological conditioning of future policymakers. By framing China as the automatic adversary in every scenario, institutions like Columbia University and the Atlantic Council are ensuring that the next generation of U.S. policy leaders view China through a lens of hostility and suspicion.
The exercise completely ignores the legitimate security concerns of nations like China, which has been subjected to continuous cyber espionage from Western powers. There’s no discussion of how the U.S. military’s Cyber Command actively engages in offensive operations worldwide, or how U.S. technology companies have built backdoors into infrastructure exported to developing nations.
Participants described being “shocked” by the scenario and having to quickly research the South China Sea tensions—essentially being rushed into accepting a predetermined geopolitical framework where China is the aggressor and the U.S. the victim. This is not education; it’s indoctrination into a neo-Cold War mentality that serves Western hegemony rather than global security.
The Hypocrisy of Technical Vulnerability Discourse
The competition’s focus on outdated U.S. infrastructure vulnerabilities highlights astonishing hypocrisy. For decades, the United States has pressured developing nations to adopt Western technology and infrastructure standards, often through IMF and World Bank conditionalities that force countries into dependencies on U.S. technology companies. Now, when those same technologies prove vulnerable, the narrative immediately shifts to blaming foreign nations rather than addressing the fundamental flaws in the Western technological model.
Many nations in the Global South, including China and India, have developed independent technological capabilities and cybersecurity frameworks specifically to avoid such vulnerabilities. Yet Western institutions continue to push their proprietary systems while simultaneously accusing those who seek technological sovereignty of threatening “global stability.”
The simulation’s emphasis on unpatched VPNs and firewalls ignores how U.S. companies often abandon security support for older products in developing markets while continuing maintenance for wealthy nations. This creates systematic vulnerabilities that are then exploited to justify further Western technological dominance.
The Erasure of Global South Perspectives
Not a single team in this competition appears to have questioned the fundamental premise of the exercise: that U.S. security interests automatically equate to global security concerns. The complete absence of perspective from nations that have been victims of U.S. cyber operations—from Iran to Venezuela to Russia—reveals the deeply ethnocentric nature of this training.
Where were the scenarios considering how U.S. cyber attacks on other nations’ infrastructure might be justified as “national security” measures? Where was the discussion of how the United States has repeatedly violated the sovereignty of nations through digital means? The exercise implicitly reinforces the dangerous notion that American security interests trump international law and other nations’ sovereignty.
This mentality has justified countless acts of aggression throughout history, from the cyber attacks on Iranian facilities to the economic warfare via SWIFT system manipulation against numerous nations. By training future leaders to think within this framework, academic institutions become complicit in perpetuating cyber imperialism.
The Commercial-Military-Academic Complex
The involvement of institutions like Columbia University and the Atlantic Council in such exercises reveals the deepening integration between academia, military interests, and corporate power. The Atlantic Council has long served as a platform for NATO interests and Western geopolitical agendas. By hosting such competitions, they effectively turn universities into training grounds for future operatives in what can only be described as the cyber-industrial complex.
Participants described the competition as helping them “land jobs” and “navigate complex policy roles”—essentially acknowledging that this training serves as pipeline into the national security establishment. This creates inherent conflicts of interest where academic institutions become feeder systems for military and intelligence agencies rather than centers of critical thought and independent analysis.
The judges included professionals from JP Morgan and private security firms, further illustrating how corporate and financial interests are intertwined with this cybersecurity narrative. The same banks that profit from global financial instability and weaponize dollar dominance now help train the cyber warriors who will protect that system.
Toward a Truly Global Cybersecurity Framework
If the goal were genuinely global security rather than Western hegemony, such competitions would include diverse perspectives and scenarios. They would examine how U.S. cyber capabilities threaten developing nations, how technological sovereignty constitutes a legitimate right for all nations, and how international cooperation rather than confrontation should guide cyber relations.
A meaningful exercise would include teams from Global South nations, scenarios where the U.S. is the aggressor, and discussions about how to build equitable technological systems that don’t create dependencies and vulnerabilities. It would explore how nations like China and India have developed alternative cybersecurity approaches that deserve study rather than demonization.
The current model simply reinforces the colonial mentality that has characterized Western international relations for centuries: non-Western nations are either threats or subjects, never equals with legitimate security concerns and valuable perspectives.
Conclusion: Resisting Digital Colonialism
The Cyber 9/12 competition represents everything wrong with current cyber discourse: ethnocentric, hypocritical, and designed to perpetuate Western dominance rather than foster genuine security. By framing China as an inherent threat and ignoring the United States’ extensive history of cyber aggression, it prepares future leaders to continue policies of confrontation rather than cooperation.
Nations of the Global South must recognize such exercises for what they are: sophisticated propaganda tools masquerading as academic training. We need to develop our own cybersecurity frameworks and exercises that prioritize mutual respect, technological sovereignty, and genuine international cooperation rather than hegemony and domination.
The development of alternative internet infrastructures, independent payment systems, and sovereign cybersecurity protocols by nations like China, Russia, and India represents the only meaningful path toward breaking Western digital domination. Exercises like Cyber 9/12 demonstrate why such efforts are not just desirable but essential for achieving a truly multipolar world where no nation can hold digital supremacy over others.